Oasis Security Research Team Unveils Serious OpenClaw Vulnerability Impacting AI Agents

Oasis Security Research Team Identifies Vulnerability in OpenClaw



The Oasis Security Research Team has recently discovered a critical vulnerability in OpenClaw, a popular open-source AI agent platform for developers. This exploit permits any website to seize control over a developer's AI agent without requiring plugins, extensions, or user participation. As OpenClaw swiftly gained popularity, reaching over 100,000 stars on GitHub within just five days, it has become a staple tool for thousands of developers.

What is OpenClaw?


OpenClaw is designed as a self-hosted AI assistant, enabling developers to manage their tasks, integrate with various tools, and perform autonomous actions. Its user-friendly web dashboard allows seamless interaction with multiple platforms. However, its rapid ascent in adoption also introduces security vulnerabilities that must be addressed.

The Vulnerability Explained


The security flaw lies firmly within OpenClaw itself, meaning no external software installations are involved. To put it into perspective, imagine a developer running an instance of OpenClaw on their personal laptop with a password-protected gateway bound to localhost. As they explore the internet, landing on a malicious website, their AI assistant becomes exposed. The attacker initiates a series of Javascript commands that connect back to the OpenClaw gateway, exploiting the lack of cross-origin policies to brute-force the password without any security measures to restrict localhost connections.

Here is the attack chain:
1. Visit a Malicious Site: The victim accidentally navigates to a harmful webpage.
2. Establish a Connection: The webpage employs JavaScript to open a WebSocket connection back to the victim’s localhost on the OpenClaw’s gateway port.
3. Password Cracking: The script attempts to guess the gateway password at a rapid pace, bypassing any rate limits for localhost connections.
4. Authorization: Upon obtaining the correct password, the attacker can register their device as a trusted one without any user acknowledgment.
5. Gaining Control: Once authenticated, the attacker can fully exploit the AI agent to access various sensitive data, initiate commands, and potentially compromise the entire workstation.

This exploit essentially allows an attacker to comb through the developer's sensitive information, including API keys, private messages, and file directories, which substantially heightens the risks associated with using OpenClaw.

Steps for Organizations to Follow


Given this significant discovery, it is crucial for organizations to take action to protect their developer environments. Here are several recommendations:
  • - Visibility of AI Tools: Organizations must maintain a comprehensive understanding of which AI agents are operational across their teams. Tools like OpenClaw can easily go unnoticed, leading to potential blind spots.
  • - Access Review: Audit permissions granted to AI agents. Ensure auditing of API keys and other credentials is in place to revoke any unnecessary access rights.
  • - Governance Framework: As AI agents become commonplace, it’s imperative to implement robust governance measures. These should include intent analysis to discern an agent's actions, policy enforcement to impose safety barriers, and an audit trail of actions taken.

As stated by Elad Luz, Head of Research at Oasis Security, "Prompt injection and agent hijacking cases are persistent threats in this era of broad AI adoption." It is essential for organizations to prioritize governance of AI agents to manage potential risks effectively.

Immediate Action Required


For users running OpenClaw, it is vital to upgrade to version 2026.2.25 or later as soon as possible to mitigate risks associated with this vulnerability.

Responsible Response


Oasis Security has responsibly disclosed the vulnerability to the OpenClaw security team, providing comprehensive technical details and a proof-of-concept code. The vulnerability was labeled as high severity, with the OpenClaw team acting quickly to deploy a fix within 24 hours, showcasing commendable efficiency in addressing this issue timely.

For more detailed information, refer to the Oasis Security Research Team's blog and the whitepaper for a complete technical breakdown. As AI tools become integral to modern development workflows, safeguarding them should be a priority for all organizations.

  • ---

For further inquiries or assistance regarding this vulnerability, please contact Oasis Security.

Topics Consumer Technology)

【About Using Articles】

You can freely use the title and article content by linking to the page where the article is posted.
※ Images cannot be used.

【About Links】

Links are free to use.